Please turn on your JavaScript for this page to function normally.
iPhone 8
The tools criminals use to prepare a stolen iPhone for resale

Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …

Phishing is a greater threat to users than keyloggers and third-party breaches

When it comes to loosing access to their accounts, phishing is a greater threat to users than keyloggers and third-party breaches, researchers have found. How many valid …

Laptop
BEC scammers are robbing art galleries and collectors

BEC scammers are targeting art galleries, collectors and artists, swindling them out of money and, on occasion, ruining their businesses. According to The Art Newspaper, nine …

LG HomeHack
Researchers turn LG’s Hom-Bot vacuum cleaner into a real-time spying device

Check Point researchers have discovered a vulnerability in LG’s smart home infrastructure that could have allowed hackers to take over the legitimate user’s account and, …

Google security
Google offers Advanced Protection for high-risk users of its services

High-risk Google users – journalists, human rights and civil society activists, but also campaign staffers and people in abusive relationships – can now take …

LinkedIn
Phishers targeting LinkedIn users via hijacked accounts

A new phishing campaign has been spotted hitting LinkedIn users via direct messages and the LinkedIn InMail feature. They are sent from legitimate LinkedIn Premium accounts …

Office 365
Office 365 account compromise attempts on the rise

Office 365, Microsoft’s software-as-a-service productivity software suite popular with corporate users, is increasingly becoming attackers’ preferred way into …

cybercrime
Hackers stole over $500,000 from Enigma cryptocurrency investors

Unknown hackers have managed to steal over $500,000 from aspiring investors in the Enigma cryptocurrency investment platform. The Enigma cryptocurrency hack The attack …

Google Chrome biohazard
Another popular Chrome extension hijacked through phishing

Chris Pederick, the creator and maintainer of the Web Developer for Chrome extension, is the latest victim of attackers who hijack popular Chrome add-ons in order to push ads …

phishing
Phishers steal Chrome extension from developer

An attacker has compromised the Chrome Web Store account of German developer team a9t9 software, and has equipped their Copyfish Chrome extension with ad/spam injection …

phishing
Phishers’ techniques and behaviours, and what to do if you’ve been phished

Once a user has been phished, how long does it takes for the phishers to misuse the stolen credentials? To discover the answer to that question and many others, Imperva …

road sign
751 domains hijacked to redirect visitors to exploit kit

An unknown attacker has managed to modify the name servers assigned to 751 domains, which resulted in some visitors to the hijacked domains being redirected to a site hosting …

Don't miss

Cybersecurity news